Skip to content

Here to guide Comet Backup through its product evolution, meet our Product Manager, Ida Lindgren

Where are you originally from?

I’m from Stockholm, Sweden and I just celebrated 5 years in New Zealand! Times flies when you are having fun! Love, family and new adventures brought me to this lovely country.

What is the one thing about Sweden that you’d like non-Swedes to know about?

We have a useful word that I don’t think many other countries have – “lagom”. It means not too much, not too little, but just the right amount and it’s a very handy word to have in your vocabulary (I think).

Also, that there are no polar bears in Sweden. It’s funny how many times I get asked that question!

How long have you been working at Comet Backup?

This is my seventh week at Comet, but it feels longer than that (in a good way)!

Before Comet, after completing a master’s degree in IT engineering and a bachelor’s in business studies, I worked as a BI Consultant in Stockholm for 8 years. When I moved here, I started working as a Senior Product Owner and I did that for almost 5 years before joining Comet.

What attracted you to Comet?

The industry was completely new to me, and I wanted to try working in a younger business that was growing fast. Having the chance to be the first dedicated product person in the company was an exciting opportunity too!

How would you describe your role as Product Manager at Comet?

In short, my role is to work closely with all Comet teams to ensure we deliver a high-quality product with a great user experience, that meets the business goals and our customers’ needs!

But to expand a bit on that, I need to keep up with industry trends, understand the market needs, know the competitor landscape, and understand what our customer needs and their pain points.

Combining this information with the business strategy, product metrics, data analytics, and all the input from Comet’s teams, I can create a product roadmap that outlines how the product will be developed and what the teams will be focused on for the next while.

Basically, as a Product Manager, you are responsible for guiding the direction of the product and its development, making sure we’re working on the right things to ensure the continued success of our product and keep growing our market share.

What was your first day at Comet like?

It was great! Everyone was so friendly and welcoming, and I’ve always enjoyed working with smart, talented, and down-to-earth people, so that has been one of the highlights here at Comet so far.

What aspects of your role challenge and excite you?

It’s wonderful how much trust, support, and freedom Comet gives me – they trust me to do the job as I see fit. I just hope I can live up to their expectations and do my part to help continue making Comet the success story it already is!

Product Managers have to juggle a lot of activities and deadlines. What best practices would you recommend for organising one’s workload?

I think a simple to-do list does the trick, but you need to make sure to re-prioritize the items on the list regularly, based on their urgency and how important they are. When I get stuck, I refer back to the product vision or strategy to figure out what should be done first (or just take a break to clear my head).

You love being out and about. Would you recommend any running or biking trails in the Canterbury area?

I think it’s really nice running or biking up the Rapaki track and then going down Victoria Park and Bowenvale Valley – it’s such a peaceful area and the views up there are great too!

What’s the most memorable or most interesting thing that’s happened to you on a trip?

In 2019 I spent three months biking around South America – the whole trip was pretty memorable, but riding through coca plantations and getting stopped by a group of suspicious-looking characters to have a beer is probably up there.

Wait, what??

Yeah it was pretty scary – we were biking around South America and this truck comes with these five guys, and you can tell they’re working at the coca plantation. They were all drinking beer and seemed to be drunk, and they stopped where we were. They were speaking Spanish and we could only understand a couple of words. Then they offered us a drink and we couldn’t say no!

There is an ongoing debate at the Comet office on whether or not pineapple should be a pizza topping. Would you care to share your thoughts on this?

Ha! No, I don’t think pineapple should be a pizza topping – but if I can stick with my pepperoni pizzas, I don´t mind if others have pineapple on their pizzas.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

23.3.8 ‘Voyager’ released

Changes compared to 23.3.7

New Features

Enhancements

  • Enhancement: Reduce peak memory usage when loading very large single files from a Storage Vault
  • Enhancement: Reduce memory usage for S3-compatible Storage destinations

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Don’t miss out on Windows! Pandora FMS has the key to its monitoring

Is your Windows getting out of hand? Doesn’t it know how to behave in front of guests? Is it like those children usually other people have who break down to cry as if they were boiling them? Thankfully, Pandora FMS has the solution for you.

Windows server monitoring with Pandora FMS

Yes, the so-called system, network and application monitoring platform has features focused particularly on Windows monitoring, and the best of all, you can do it remotely or locally! In addition, thanks to software agent installation, you can have total control of your Windows servers. Pandora FMS offers you full monitoring of Windows servers so you may have the information you need to solve problems in real time. You no longer will have to guess what the hell is going on, with Pandora FMS you can quickly identify problems and fix them effectively. If this sounds too good to be true… wait until you see our video, the one below, where we will show you in detail all those advantages! Join us on this tour and find out how Pandora FMS can help you take control of your Windows systems easily and effectively! I know, I know, you loved the format! Well, if so, do not miss our next video on our channel. To date we have more than 1700 subscribers. Slick to be a channel specializing in software monitoring, right?

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Distributed systems: Because a single computer can’t deal with your procrastination

In our eagerness to bring you all the definitions of the world of technology we hired a sherpa, with calves made of steel, who travels the confines of the Himalayas collecting the most exclusive and inaccessible information from temple to temple. Because everyone knows it, the greatest secrets of technology are kept by the monks of monasteries like those of Rizong, Jammu or Kashmir, not the Internet. That’s why today, on Pandora FMS blog, just arrived from the Indian subcontinent, we reveal to you the truth about distributed systems.

Distributed systems: features and best practices

We opened the dusty parchment of Sherpy (that would be our sherpa) and let’s get down to business!

A distributed system is a computing environment that spans multiple devices, coordinating their efforts to complete a job much more efficiently than if it were with a single device.

Distributed systems offer many advantages over traditional computing environments, such as reducing risks by avoiding a single point of failure, improving reliability, and increasing scalability.

However, they also carry their own set of risks and challenges.

Elements of distributed systems

Distributed systems are designed to operate over the Internet, and the most common implementations involve the use of Cloud computing.

A distributed system begins with a task, which is managed by an application that divides it into sections.

For example, a video editor on a client computer may give a dozen different computers (or nodes) a frame of a video to complete rendering.

Once the frame is completed, the managing application gives the node a new frame to work on.

This process continues until the video is finished and all the pieces are put back together.

This system can scale to hundreds or thousands of nodes, which can complete in a few minutes a task that would have taken a single computer days.

Distributed system types

There are many models and architectures of distributed systems, including client-server systems, peer-to-peer networks, mobile phone networks, and cloud-based virtual server instances.

Client-server systems are the most traditional and simple type of distributed system, in which several networked computers interact with a central server to store data, process it or perform any other common purpose.

Mobile networks are an advanced type of distributed system that shares workloads between terminals, switching systems, and Internet-based devices.

Peer-to-peer networks distribute workloads among hundreds or thousands of computers running the same software.

Cloud-based virtual server instances are the most common forms of distributed systems in enterprises today, as they transfer workloads to dozens of cloud-based virtual server instances that are created as needed and terminated when the task is completed.

Key features of distributed systems

Distributed systems are characterized by their:

  • Scalability
  • Concurrence
  • Availability/failover
  • Transparency
  • Heterogeneity
  • Replication

As you know, scalability is the ability to grow as the workload size increases, which is achieved by adding additional processing units or nodes to the network as needed.

Concurrency refers to the components of the distributed system running simultaneously, characterized by the lack of a “global time”, where tasks take place out of sequence and at different rates.

Availability/failover tells us that if a node fails, the remaining nodes can continue operating without interrupting the overall calculation.

Transparency means that an external programmer or end user sees a distributed system as a single computational unit and not its underlying parts.

Heterogeneity, that nodes and components are often asynchronous, with different hardware, middleware, software and operating systems.

Replication allows information and message sharing, ensuring consistency between redundant resources, such as software or hardware components, improving failover, reliability and accessibility.

Distributed tracking

-Keep reading, Sherpy:

*Literal translation of a mystical and remote Tibetan language:

Distributed tracking is a method for monitoring applications built on a microservices architecture that are routinely deployed in distributed systems.

Tracking systems monitor processes step by step, helping developers discover bugs, bottlenecks, latency, or other issues within the application.

Distributed tracking is necessary due to the complexity of modern software architectures.

It is designed to operate in a distributed services infrastructure, where it can track multiple applications and processes simultaneously across multiple nodes and concurrent computing environments.”

-Thank you, Sherpy.

-At your service.

Risks and advantages of distributed systems

As we just saw, these types of systems offer many and wide-ranged advantages, such as higher efficiency, scalability, reliability…

However, they also entail certain risks, such as security vulnerabilities, increased complexity, and the possibility of data loss.

-“Security vulnerabilities may arise due to the distributed nature of the system, making it more difficult to secure and monitor all components.”

-Very well explained, Sherpy.

-Tshe lo.

The sherpa finally said, disappearing into a cloud of explosive smoke.

Conclusion

It may seem that distributed systems extend computing power too far, but they actually make it go further.

With the ability to quickly scale and coordinate multiple nodes, distributed systems are like the ultimate computer equipment training exercise. 

And let’s face it, if computers had to participate in those confidence-loss exercises that humans have to endure in team-building events, they would likely fail miserably.

So let’s limit ourselves to distributed systems and leave the loss of confidence to humans.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Automotive IoT: Use Cases & Security

The global automotive IoT market size was valued at USD 82.7 billion in 2021 but is projected to surpass around USD 621.8 billion by 2030. In other words, IoT is massively disrupting the automotive sector, and this trend will persist as automakers look for innovative ways to set themselves apart in a fiercely competitive market. Connected cars, telematics, fleet management, and autonomous vehicles are just a few examples of how IoT is revolutionizing how we drive and maintain vehicles.

However, while these advancements offer many benefits, they also pose significant security challenges. With this in mind, let’s explore the use cases of Automotive IoT and the challenges of Automotive IoT security. By understanding the potential of IoT and its associated risks, we can better prepare ourselves for a more connected and secure future.

IoT in the Automotive Industry: Leading Use Cases

Car manufacturers and buyers alike can now harness IoT for a wide range of industrial and commercial applications. Let’s look at some prominent IoT applications in the automotive industry.

Fleet Management

IoT has transformed the way fleet managers track and manage their vehicles. Real-time GPS tracking and data analytics allow for better decision-making, reduced costs, and fleet operation optimization. Fleet managers can track vehicles in real-time, monitor driver behavior, optimize routes, and predict maintenance needs, all of which help reduce costs and increase efficiency.

Connected Cars

Automotive IoT has ushered in a new era of smart, connected cars. With Cellular Vehicle-to-Everything (CV2X) technology, vehicles can establish four types of connections: Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrian (V2P), and Vehicle-to-Network (V2N). By communicating with other vehicles, pedestrians, and the environment, these internet-connected cars can share critical data to prevent accidents and facilitate emergency vehicle movement. In addition, these connected cars also inform drivers of weather conditions and accidents on the road.

Automotive Maintenance Systems

IoT-powered automotive maintenance systems allow for predictive maintenance, reducing downtime and costs. For example, sensors in the car can detect when a part is about to fail, alerting the driver or the service center in advance. This allows for proactive repairs and maintenance, reducing the risk of breakdowns and improving the overall lifespan of the vehicle.

Autonomous Vehicles

There are no autonomous vehicles without IoT. For vehicles to operate safely without human intervention (or with limited human input), they need to be in constant communication with their environments. Self-driving cars can reduce accidents, improve traffic flow, and reduce emissions. They do this by relying on a network of sensors and data analytics to operate safely and efficiently. In other words, they rely on automotive IoT.

Smart Parking

IoT-powered smart parking systems allow for real-time monitoring and management of parking spaces. As a result, drivers can be directed to available spaces, reducing the time spent searching for parking and reducing congestion. Smart parking systems also allow for automated payment, reducing the need for physical payment and the risk of fraud.

In-vehicle Infotainment and Telematics

IoT-powered in-vehicle infotainment and telematics systems offer various features and benefits, including entertainment, communication, and safety. Drivers can access real-time traffic updates, weather information, and entertainment options such as streaming music and video. In addition, telematics systems allow for remote diagnostics, vehicle tracking, and emergency response services in case of an accident. For example, in-vehicle telematics systems can communicate driver information to auto insurers or police following an accident.

Automotive IoT Security

It’s no secret that IoT devices suffer from significant security vulnerabilities, and automotive IoT is no exception here. Unfortunately, many of these devices are not designed with security in mind, leaving them open to exploitation by malicious actors.

But why exactly are automotive IoT devices so insecure? IoT devices are often small and have limited storage, meaning they lack the necessary computing power to run complex security protocols. This constraint often results in trade-offs between functionality, cost, and security, leading to devices prioritizing functionality over robust security.

And more specifically, IoT devices suffer from a range of other issues that make them vulnerable to cyberattacks, including:

  • Weak passwords & settings: IoT devices are often shipped with weak or default passwords that are easily guessable or can be found online. This makes it easy for attackers to gain access to the device and compromise the network.
  • Outdated firmware: Many IoT devices rely on third-party software libraries that can become outdated, leaving the device vulnerable to known security flaws. In some cases, it’s not possible to update this firmware.
  • Poor native device security: Some manufacturers prioritize features and functionality over security, leaving IoT devices with weak security features. Some devices may use insecure protocols or have default settings that leave them vulnerable to attack. For example, when a device communicates in plain text, all transmitted information can easily be intercepted via a Man-in-the-Middle attack.
  • Lack of standardization and regulation: IoT devices come in various shapes and sizes, with varying levels of security features, and there is no universal standard for automotive IoT security. Additionally, regulations and laws around IoT security are still evolving, making it challenging to hold manufacturers accountable for insecure devices.
  • Physical access: Unlike traditional computing devices, IoT devices are often physically accessible to attackers, making them easier to compromise.
  • Interconnectedness: IoT devices are often interconnected and communicate with each other, creating a large attack surface and making it challenging to secure the entire network.

Crucially, while other IoT devices like connected speakers or washing machines may have fewer security features, their privacy and safety risks are relatively low compared to automotive IoT devices. In contrast, if cybercriminals hack a car, they can access sensitive location and destination data and potentially manipulate essential functions like braking or steering, posing a significantly higher risk to drivers and passengers.

Combating Automotive IoT Attacks

Despite the security challenges IoT devices face, cost-effective solutions are available to help prevent attacks.

Firstly, requiring a Trusted Computing Base (TCB) can bolster network and application security. A TCB is a set of hardware and software components that work together to enforce security policies. And we can use it to protect sensitive data and ensure that only authorized applications are running.

Secondly, ensuring that all network communications are confidential and have integrity is crucial for securing IoT devices. Manufacturers can use encryption to protect data in transit and prevent attackers from intercepting sensitive information.

Thirdly, restricting application behavior can also help mitigate security risks. This can be achieved by limiting the access that applications have to sensitive data, such as geolocation information or device identifiers.

Finally, enforcing tamper resistance can make it more difficult for attackers to compromise IoT devices. For example, using hardware-based security features, such as secure boot and trusted platform modules (TPMs), can help prevent unauthorized access and tampering.

Overall, implementing these measures can help improve the security of IoT devices and reduce the risk of harmful cyber attacks.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×